Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-03-2023 16:21
Static task
static1
Behavioral task
behavioral1
Sample
21279e058d7e578c1af204d1fe27885b25b7b0e6dbb5782e8b23f7582619d3a8.exe
Resource
win10v2004-20230220-en
General
-
Target
21279e058d7e578c1af204d1fe27885b25b7b0e6dbb5782e8b23f7582619d3a8.exe
-
Size
530KB
-
MD5
50fe64cfd968402930cf13b705f8dc9f
-
SHA1
d7c8c604889684a7e9ac852c1025ebf2d7cbdeb9
-
SHA256
21279e058d7e578c1af204d1fe27885b25b7b0e6dbb5782e8b23f7582619d3a8
-
SHA512
16bf4e6e0f5a613304f3c7938534329489e667e29d8ecd5bcb30dbbe051b78c7f211b44df8698f84df8c5602b5b206504f2e39daaaf648087cab4f61b66aa67f
-
SSDEEP
12288:UMrry90qxFudwQrhxK1K2PvWs4DomxFtbeJVSv0WeI:nyD3u2Q61KOv1comry40fI
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf96vK16ov36.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf96vK16ov36.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf96vK16ov36.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf96vK16ov36.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf96vK16ov36.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf96vK16ov36.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4876-156-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-158-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-161-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-163-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-165-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-167-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-169-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-171-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-173-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-175-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-177-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-179-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-181-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-183-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-185-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-187-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-189-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-191-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-193-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-195-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-197-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-199-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-201-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-203-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-205-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-207-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-209-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-211-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-213-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-215-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-217-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-219-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline behavioral1/memory/4876-221-0x0000000005290000-0x00000000052CE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3076 vhvH8942vx.exe 3968 sf96vK16ov36.exe 4876 tf21zo40qn54.exe 548 uhvS32Ho15nj.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf96vK16ov36.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 21279e058d7e578c1af204d1fe27885b25b7b0e6dbb5782e8b23f7582619d3a8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 21279e058d7e578c1af204d1fe27885b25b7b0e6dbb5782e8b23f7582619d3a8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhvH8942vx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhvH8942vx.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4648 4876 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3968 sf96vK16ov36.exe 3968 sf96vK16ov36.exe 4876 tf21zo40qn54.exe 4876 tf21zo40qn54.exe 548 uhvS32Ho15nj.exe 548 uhvS32Ho15nj.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3968 sf96vK16ov36.exe Token: SeDebugPrivilege 4876 tf21zo40qn54.exe Token: SeDebugPrivilege 548 uhvS32Ho15nj.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4716 wrote to memory of 3076 4716 21279e058d7e578c1af204d1fe27885b25b7b0e6dbb5782e8b23f7582619d3a8.exe 84 PID 4716 wrote to memory of 3076 4716 21279e058d7e578c1af204d1fe27885b25b7b0e6dbb5782e8b23f7582619d3a8.exe 84 PID 4716 wrote to memory of 3076 4716 21279e058d7e578c1af204d1fe27885b25b7b0e6dbb5782e8b23f7582619d3a8.exe 84 PID 3076 wrote to memory of 3968 3076 vhvH8942vx.exe 85 PID 3076 wrote to memory of 3968 3076 vhvH8942vx.exe 85 PID 3076 wrote to memory of 4876 3076 vhvH8942vx.exe 90 PID 3076 wrote to memory of 4876 3076 vhvH8942vx.exe 90 PID 3076 wrote to memory of 4876 3076 vhvH8942vx.exe 90 PID 4716 wrote to memory of 548 4716 21279e058d7e578c1af204d1fe27885b25b7b0e6dbb5782e8b23f7582619d3a8.exe 96 PID 4716 wrote to memory of 548 4716 21279e058d7e578c1af204d1fe27885b25b7b0e6dbb5782e8b23f7582619d3a8.exe 96 PID 4716 wrote to memory of 548 4716 21279e058d7e578c1af204d1fe27885b25b7b0e6dbb5782e8b23f7582619d3a8.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\21279e058d7e578c1af204d1fe27885b25b7b0e6dbb5782e8b23f7582619d3a8.exe"C:\Users\Admin\AppData\Local\Temp\21279e058d7e578c1af204d1fe27885b25b7b0e6dbb5782e8b23f7582619d3a8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhvH8942vx.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhvH8942vx.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf96vK16ov36.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf96vK16ov36.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3968
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf21zo40qn54.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf21zo40qn54.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 13364⤵
- Program crash
PID:4648
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhvS32Ho15nj.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhvS32Ho15nj.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4876 -ip 48761⤵PID:2960
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5be3dd4a02ae3010e643d8fc0cb8fc331
SHA17e2421ee9e6def3e31a5acf1d7771b2911a2a288
SHA2561a1f5297857b6f3ff780efd97db3f3cb602eeba948718c0f6c48db74c907b479
SHA51207d3834ae379cd6d2fe0fdeb27de234d73bd9080970cf6b3306820460ba1853194ffb8f2dd36617dfc4bcb049ee504f77e10e242e3d17d22f306137c2fa94691
-
Filesize
175KB
MD5be3dd4a02ae3010e643d8fc0cb8fc331
SHA17e2421ee9e6def3e31a5acf1d7771b2911a2a288
SHA2561a1f5297857b6f3ff780efd97db3f3cb602eeba948718c0f6c48db74c907b479
SHA51207d3834ae379cd6d2fe0fdeb27de234d73bd9080970cf6b3306820460ba1853194ffb8f2dd36617dfc4bcb049ee504f77e10e242e3d17d22f306137c2fa94691
-
Filesize
385KB
MD5fec9ddb0edf237005ce4e2e3a7332fd3
SHA1a73af612d799a159fc3275f321f4deb4114da1de
SHA256bf5ed3aedd497934fd57bbfbef946978ac3715f4d58b2fbf194ddb831f848517
SHA512f05f3b6eec848c4cab1e3014077f9f50219c9c74c17048f5742c3c4f0526f70cc855794530aa26ef8ee03acba4ad5e10a1762e96016e2440083f80df2beaea06
-
Filesize
385KB
MD5fec9ddb0edf237005ce4e2e3a7332fd3
SHA1a73af612d799a159fc3275f321f4deb4114da1de
SHA256bf5ed3aedd497934fd57bbfbef946978ac3715f4d58b2fbf194ddb831f848517
SHA512f05f3b6eec848c4cab1e3014077f9f50219c9c74c17048f5742c3c4f0526f70cc855794530aa26ef8ee03acba4ad5e10a1762e96016e2440083f80df2beaea06
-
Filesize
11KB
MD5e27fa72bad37b1f1917e44e9fdfd55e7
SHA108a79e06d544fbcf834e7bc8e39ae652d4a6f8fa
SHA25643750497c3d834e01026f6c634f387c2e16e585f1be8a2551adf9ffeb511a2f3
SHA512799b1f813f3522a19d7ffaf5b4cf0ad6e471526d4df39bfe4c29eabeffe2f3538cd2694c886d9e47bdb216170493b04c15581fb86f08281f0735c66f431cc846
-
Filesize
11KB
MD5e27fa72bad37b1f1917e44e9fdfd55e7
SHA108a79e06d544fbcf834e7bc8e39ae652d4a6f8fa
SHA25643750497c3d834e01026f6c634f387c2e16e585f1be8a2551adf9ffeb511a2f3
SHA512799b1f813f3522a19d7ffaf5b4cf0ad6e471526d4df39bfe4c29eabeffe2f3538cd2694c886d9e47bdb216170493b04c15581fb86f08281f0735c66f431cc846
-
Filesize
294KB
MD5cdcef278fd567074f7fd62913f828c7f
SHA1f8f15924c0670526951bd988acd59ba3b0f95889
SHA256fdc600b7491c442a1c8538b09303b44c51fe3436671493cbc7ab0ca5bd512243
SHA51206d63079ba454a6f9d86208369ace8125db61e97d5dce25ca0a2e6c244403ff9ef7bed684c48592248273a5ffa5a79c56c4f2ce941fe2eb04800606072178d2d
-
Filesize
294KB
MD5cdcef278fd567074f7fd62913f828c7f
SHA1f8f15924c0670526951bd988acd59ba3b0f95889
SHA256fdc600b7491c442a1c8538b09303b44c51fe3436671493cbc7ab0ca5bd512243
SHA51206d63079ba454a6f9d86208369ace8125db61e97d5dce25ca0a2e6c244403ff9ef7bed684c48592248273a5ffa5a79c56c4f2ce941fe2eb04800606072178d2d